Making Log Analytics a Critical Component of Your Performance Monitoring Strategy
July 28, 2014

Vess Bakalov
SevOne

Share this

Historically, log data has been viewed by IT professionals as a valuable asset in the areas of security information and event management. And while there is no denying the benefits of log data for security teams, I suggest that organizations also consider logs as an important source for managing the performance of their infrastructures.

By definition, logs are a record of all user transactions, customer and machine behavior, security threats, fraudulent activity and more. Applications, systems, and network devices produce enormous volumes of unstructured log data. And it's this unstructured data that presents a challenge to properly categorize and mine for intelligence. But when a performance-based log analytics platform can collect and analyze unstructured log data, that data becomes a valuable resource for you to better predict, detect, troubleshoot and resolve network and data center issues.

According to Jim Frey, Vice President of Research at Enterprise Management Associates (EMA), organizations should ensure that log analytics is a key component of their overall performance monitoring strategy. To this point, research from EMA has found that there is strong and growing interest in leveraging log data across multiple infrastructure troubleshooting and operations management uses cases.

However, it's not if – but how – you incorporate log analytics into your performance monitoring process that produces the greatest results.

Many organizations today leverage log search solutions, but the reality is that it takes a lot of time, effort, and education on your part to get value from log data. For instance, you're required to manually search log data after an event takes place – this often requires knowledge of a complex and vendor-specific query language. Essentially, you have the tools to help put out the fires, but wouldn't you rather detect the smoke beforehand?

Another issue with log search solutions is that you must manually compile log reports and then correlate performance metrics to that log data – another time-intensive effort.

Based on the numerous challenges inherent with traditional log search solutions, I suggest organizations look for a performance-based log analytics platform that provides, with a single click, the ability to pivot from real-time performance metrics (such as SNMP or an IP SLA test) to the related log records, and without the time-consuming search and manual correlation typically associated with log tools. Your success with log analytics should be measured by the extent to which you can automate the extraction of actionable insight from logs at the point of ingestion. Your ability to guarantee the performance of your infrastructure depends on a more proactive approach than what we've seen from many log "analytics" tools on the market today.

Vess Bakalov is Senior Vice President, CTO and Co-Founder of SevOne.

Share this

The Latest

May 23, 2018

To help your organization increase data center efficiency and get the most benefit out of your monitoring solutions, here are the remaining universal monitoring crimes and what you can do about them ...

May 22, 2018

Monitoring is a critical aspect of any data center operation, yet it often remains the black sheep of an organization's IT strategy: an afterthought rather than a core competency. To help your organization increase data center efficiency and get the most benefit out of your monitoring solutions, here are the top five universal monitoring crimes and what you can do about them ...

May 18, 2018

The deeper intricacies of the site reliability engineer (SRE) role are still evolving, and to gain some insights into what the role actually entails we recently conducted a survey aimed at this growing group. The role may vary from organization to organization. The commonalities we identified include the following ...

May 16, 2018

While security experts may disagree on exactly how to secure a network, one thing they all agree on is that you cannot defend against what you cannot see. In other words, network visibility IS network security. Visibility needs to be the starting the point ...

May 15, 2018

APMdigest asked experts from across the IT industry for their opinions on the essential tools to support digital transformation. Part 7, the last installment, offers some final thoughts about "tools" that are not necessarily technology ...

May 14, 2018

APMdigest asked experts from across the IT industry for their opinions on the essential tools to support digital transformation. Part 6 covers the development process ...

May 11, 2018

APMdigest asked experts from across the IT industry for their opinions on the essential tools to support digital transformation. Part 5 is all about data ...

May 10, 2018

APMdigest asked experts from across the IT industry for their opinions on the essential tools to support digital transformation. Part 4 covers communication and collaboration ...

May 09, 2018

APMdigest asked experts from across the IT industry for their opinions on the essential tools to support digital transformation. Part 3 covers analytics, AI and machine learning ...

May 08, 2018

APMdigest asked experts from across the IT industry for their opinions on the essential tools to support digital transformation. Part 2 covers the network and the cloud ...